Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-3555

Опубликовано: 09 нояб. 2009
Источник: debian
EPSS Низкий

Описание

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apache2fixed2.2.14-2package
opensslfixed0.9.8k-6package
nssfixed3.12.6-1package
sun-java5removedpackage
sun-java5no-dsalennypackage
sun-java6fixed6.19-1package
sun-java6fixed6-22-0lennylennypackage
openjdk-6fixed6b18-1.8.2-1package
nginxfixed0.7.64-1package
matrixsslfixed1.8.8-1package
matrixsslno-dsalennypackage
tomcat-nativefixed1.1.18-1package
tomcat-nativeno-dsalennypackage
gnutls26not-affectedpackage
polarsslfixed1.2.0-1package
classpathremovedpackage
zorpfixed3.9.2-1package
zorpno-dsasqueezepackage
zorpno-dsalennypackage
lighttpdfixed1.4.30-1package
poundfixed2.6-6.1package
poundno-dsajessiepackage

Примечания

  • Update 22 for Sun Java implemented the new RFC extension

  • the anti_beast.patch in pound 2.6-2 has some provision for this issue too but it seems to be broken, cf #765649

  • for any of the currently unfixed implementations, you can solve the problem by disabling renegotiation

  • the following implement RFC 5746:

  • - openssl 0.9.8m-1

  • - apache 2.2.15-1

  • - nss 3.12.6-1

  • - sun-java6 6.19-1

EPSS

Процентиль: 88%
0.04027
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

redhat
больше 15 лет назад

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

nvd
больше 15 лет назад

The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.

github
около 3 лет назад

Apache Tomcat affected by vulnerability in TLS and SSL protocol

oracle-oval
около 15 лет назад

ELSA-2010-0165: nss security update (MODERATE)

EPSS

Процентиль: 88%
0.04027
Низкий